• 제목/요약/키워드: Critical infrastructure

검색결과 481건 처리시간 0.025초

CALS체계의 정보보호 구조 연구 (A Study on the Security Architecture of CALS System)

  • 남길현
    • 한국전자거래학회지
    • /
    • 제4권2호
    • /
    • pp.197-208
    • /
    • 1999
  • With developing computer and communication technologies, the concept of CALS system has been popular not only to military but also to commercial industries. The security problem is one of the most critical issues to construct CALS infrastructure. The CALS system needs some security functions such that data confidentiality, integrity, authenticity, availability, and non-repudiation. This paper proposes a security architecture model in CALS. The security architecture model is composed of 5 submodels such that network security model, authentication and key management model, operation and audit model, integrated database security model, and risk analysis model.

  • PDF

Applications of Information Technology for Knowledge Management Implementations

  • 홍순구;홍석기;이상식;김종원
    • 한국정보시스템학회:학술대회논문집
    • /
    • 한국정보시스템학회 2001년도 추계학술대회 발표논문집:차세대 전상거래 시대의 비즈니스전략
    • /
    • pp.285-290
    • /
    • 2001
  • The borderless global economy has accentuated the importance of knowledge as the most critical source of competitive advantage. Thus, knowledge management has become a strategic mandate for most world-class organizations. A key enabler for implementing an effective knowledge management system is advanced information technology. Strategies for developing an enterprise-wide knowledge management system Infrastructure with embedded information technology are discussed. In particular, this paper discusses the concept of a knowledge management life cycle- -knowledge capture, knowledge development, knowledge sharing, and knowledge utilization, and how applications of new information technology support each step of the knowledge management practices within and between organizations is suggested.

  • PDF

무선 Ad-Hoc 망의 프로토콜 설계 및 보안 모델 해석 (Analyses of Security Model and Design of Protocol for Wireless Ad-Hoc Network)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2005년도 춘계종합학술대회
    • /
    • pp.860-863
    • /
    • 2005
  • Ad-Hoc networks are a new generation of networks offering unrestricted mobility without any underlying infrastructure. Primary applications of Ad-Hoc networks are in military, tractical and other security sensitive operations, where the environment is hostile. Hence, security is a critical issue. In this paper, we ahve identified certain misbehaviors caused by mallicious node for reactive routing protocol. We also discuss the intrusion detection and intrusion prevention model to prevent several identified attacks in the networks

  • PDF

최신 APT 해킹공격에 대한 방어 (Defending Against Today's Advanced Persistent Threats)

  • 조나단 마펑;이훈재
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2012년도 추계학술발표대회
    • /
    • pp.954-957
    • /
    • 2012
  • Recent high profile attacks have brought the attention of governments, corporations, and the general public towards the dangers posed by Advanced Persistent Threats. This paper provides an analysis of the attack vectors employed by these actors by studying several recent attacks. We present recommendations on how to best defend against these threats by better classification of critical information infrastructure and assets, people protection, penetration tests, access control, security monitoring, and patch management.

상향트래픽 파장분할 EPON에서 우선순위 큐를 고려한 차등대역폭 할당방법 (Differential Bandwidth Allocation Method using Upstream Bandwidth Wavelength Division of EPON)

  • 서창진;장용석
    • 디지털융복합연구
    • /
    • 제10권4호
    • /
    • pp.265-270
    • /
    • 2012
  • 최근 기간망의 전송속도는 괄목할 만한 성장을 이루고 있으나 가입자 전송망의 전송속도는 이전 수준에 비교해서 진정이 없는 상태이다. 그래서 가입자 접속 구간은 다수의 LAN과 백본망 사이에 병목지점으로 지적되고 있다. 현재 가입자 구간은 VOD, 양방향게임, 양방향 영상회의와 같은 새로운 대용량 멀티미디어 서비스를 수용하기에 충분한 대역폭을 제공하지 못하고 있다. 그런 가운데 저가의 이더넷 장비와 광선로 인프라를 융합한 EPON(Ethernet Passive Optical Network)이 차세대 가입자 접속망에 가장 적합하다. 하지만 이러한 우수성을 가진 EPON도 안정적인 대용량 멀티미디어 서비스를 제공하기에는 부족함을 가지고 있다. EPON에서 ONU가 수신할 수 있는 대역폭은 1GBPS이지만 송신하기 위한 대역폭은 모든 ONU가 공유해야 하므로 부족하다. 따라서 양방향 초고속 가입자 접속망을 위해 FTTx를 지원하는 EPON의 부족한 상향 전송 대역폭을 충족시키는 상향 대역폭 할당 방법이 필요하다. 본 논문에서는 EPON의 상향 트래픽에 대한 QoS를 보장하기 위한 우선순위 큐를 고려한 가중치 기반의 차등대역폭 할당 방식을 제안한다.

국가정보화 추진정책에 관한연구 - 초고속정보통신망기반의 구축을 중심으로 - (A Study on the State Policy for the Development of National Information Infrastructure)

  • 정충식
    • 한국컴퓨터정보학회논문지
    • /
    • 제1권1호
    • /
    • pp.7-24
    • /
    • 1996
  • 오늘날 선진 각국들은 “초고속정보통신망의 구축"이라는 국가차원의 정책을 잇 따라 발표하고 있다. 이것은 단순히 정보통신망의 구축만을 의미하는 것이 아니라 앞으로 도래할 정보사회의 무한경쟁 시대에 대비하기 위한 것이다. 특히 이러한 초고속정보통신망의 구축은 전자문서와 전자결재의 활용을 가능하게 하여 사무관리의 측면에서도 많은 변화를 예고하고 있다. 따라서 우선 선진 각국의 초고속정보통신기반의 구축사례와 우리나라의 추진 정책을 고찰하였다. 이어서 이를 국가정보화추진의 관점에서 법과 제도의 정비 방안의 일환으로 작년에 제정된 정보화촉진기본법의 제정 사례를 중심으로 하여 살펴보았다 우리나가 초고속정보통신망기반의 구축사업은 이제 막 시작되었으므로 앞으로 사무관리의 측면에서 EDI의 적용업무 분야 등 보다 깊은 연구가 뒤따라야 할 것이다. 것이다.

  • PDF

Statistical calibration of safety factors for flexural stiffness of composite columns

  • Aslani, Farhad;Lloyd, Ryan;Uy, Brian;Kang, Won-Hee;Hicks, Stephen
    • Steel and Composite Structures
    • /
    • 제20권1호
    • /
    • pp.127-145
    • /
    • 2016
  • Composite column design is strongly influenced by the computation of the critical buckling load, which is very sensitive to the effective flexural stiffness (EI) of the column. Because of this, the behaviour of a composite column under lateral loading and its response to deflection is largely determined by the EI of the member. Thus, prediction models used for composite member design should accurately mirror this behaviour. However, EI varies due to several design parameters, and the implementation of high-strength materials, which are not considered by the current composite design codes of practice. The reliability of the design methods from six codes of practice (i.e., AS 5100, AS/NZS 2327, Eurocode 4, AISC 2010, ACI 318, and AIJ) for composite columns is studied in this paper. Also, the reliability of these codes of practice against a serviceability limit state criterion are estimated based on the combined use of the test-based statistical procedure proposed by Johnson and Huang (1997) and Monte Carlo simulations. The composite columns database includes 100 tests of circular concrete-filled tubes, rectangular concrete-filled tubes, and concrete-encased steel composite columns. A summary of the reliability analysis procedure and the evaluated reliability indices are provided. The reasons for the reliability analysis results are discussed to provide useful insight and supporting information for a possible revision of available codes of practice.

Optimized Security Algorithm for IEC 61850 based Power Utility System

  • Yang, Hyo-Sik;Kim, Sang-Sig;Jang, Hyuk-Soo
    • Journal of Electrical Engineering and Technology
    • /
    • 제7권3호
    • /
    • pp.443-450
    • /
    • 2012
  • As power grids are integrated into one big umbrella (i.e., Smart Grid), communication network plays a key role in reliable and stable operation of power grids. For successful operation of smart grid, interoperability and security issues must be resolved. Security means providing network system integrity, authentication, and confidentiality service. For a cyber-attack to a power grid system, which may jeopardize the national security, vulnerability of communication infrastructure has a serious impact on the power grid network. While security aspects of power grid network have been studied much, security mechanisms are rarely adopted in power gird communication network. For security issues, strict timing requirements are defined in IEC 61850 for mission critical messages (i.e., GOOSE). In this paper, we apply security algorithms (i.e., MD-5, SHA-1, and RSA) and measure their processing time and transmission delay of secured mission critical messages. The results show the algorithms satisfying the timing requirements defined in IEC 61850 and we observer the algorithm that is optimal for secure communication of mission critical messages. Numerical analysis shows that SHA-1 is preferable for secure GOOSE message sending.

The Aggregate Production Efficiency of IT Investment: a Non-Linear Approach

  • Repkine, Alexandre
    • 기술경영경제학회:학술대회논문집
    • /
    • 기술경영경제학회 2002년도 제20회 동계학술발표회 논문집
    • /
    • pp.59-89
    • /
    • 2002
  • The rapid diffusion of information and telecommunication (IT) technologies during the recent decennia produced fundamental changes in the economic activity at a global level, resulting in what became coined as the "new economy". However, empirical evidence on the contribution of IT equipment to growth and productivity is at best mixed, with the more or less consistent results on the positive link between the two relating to the United States in the 1990-s. Although the empirical literature on the link between IT investment and economic performance employs a wide variety of methodologies, the overwhelming majority of the studies appears to be employing the assumption of linearity of the IT-performance relationship and predominantly explores the direct nature thereof. In this study we relax both these assumptions and find that the indirect, or aggregate productive efficiency, effects of IT investment are as important as are the direct ones The estimated non-linear nature of the indirect relationship between IT investment intensity and productive efficiency accommodates the concepts of critical mass and complementary (infrastructure) capital offered in the literature. Our key finding is that the world economy′s average level of IT investment intensity remained below the estimated critical mass. Since in this study we developed a methodology that allows one to explicitly measure the critical mass of IT investment intensity, its individual estimation at a country or industrialsector level may help evaluate the extent to which IT investment activity has to be encouraged or discouraged.

  • PDF

International Construction Joint Ventures with Developing Countries: Singapore's Case for Risk Assessment and Allocation

  • Hwang, Bon-Gang;Zhao, Xianbo;Chin, Eileen Wei Yan
    • 국제학술발표논문집
    • /
    • The 6th International Conference on Construction Engineering and Project Management
    • /
    • pp.435-439
    • /
    • 2015
  • It is important for Singaporean companies to manage the multifaceted risks when forming international construction joint ventures (ICJVs) with developing countries. The objectives of this study are to assess the risks associated with Singaporean ICJVs with developing countries, and investigate the risk allocation preferences in these ICJVs. To fulfill these objectives, a literature review was carried out and a questionnaire survey was performed with 38 professionals. The survey results reported "political instability" as the most critical risk, and market level risks were less critical than country and project level risks. Additionally, the results showed agreement on the risk ranking between building and infrastructure ICJVs, despite significant differences in the criticalities of five risks. Furthermore, five risks were preferably allocated to host and foreign partners, respectively, while 13 risks could be shared among partners. As few studies have explored the risk allocation preferences in ICJVs, this study expands the literature. Also, the identification of the risks allows other companies to customize their own lists of critical risks, while the preferred risk allocation provides valuable information for companies from various countries that intend to form ICJVs with developing countries. Thus, this study contributes to the global body of knowledge relating to ICJVs.

  • PDF